
How Log4Shell remediation interfered with organizations’ cybersecurity readiness
(ISC)² published the results of an online poll examining the Log4j vulnerability and the human impact of the efforts to remediate it. Cybersecurity professionals from around …

How to keep pace with rising data protection demands
The disconnect between business expectations and IT’s ability to deliver has never been more impactful, according to a Veeam report, which found that 89% of organizations are …

Multi-tool/multi-cloud environments reaching the limit of their efficacy
CloudBolt Software released its latest research report, examining industry sentiment in specific dimensions of hybrid cloud/multi-cloud, and aiming to uncover unmet cloud …

Consumers don’t mind handing out their data for better user experience
In a global consumer survey, Axway finds that almost 60% of people believe it’s worth allowing companies to access their personal data if it means a better user …

What do consumers really think about privacy?
Merkle has released a report which has historically reported on the marketing leader’s point of view, but this time turns its focus to consumers, revealing their sentiments …

83% of employees continue accessing old employer’s accounts
In a recent study, Beyond Identity gathered responses from former employees across the United States, the United Kingdom, and Ireland and found 83% of employees admitted to …

Visibility is key to optimized cloud infrastructure costs
ESG surveyed IT, DevOps, and AppDev professionals responsible for evaluating, purchasing, managing, and building application infrastructure. Out of 357 professionals, 64% …

Software supply chain security still a pain point
ActiveState announced the results of its survey, providing insights into the security challenges of the software industry’s open source supply chain, which includes the …

Is higher security a benefit of database migration to the cloud?
MariaDB announced key findings from its survey that shows no one’s staying behind as businesses move forward with database migration to the cloud. Those surveyed included IT …

The importance of implementing a zero trust strategy
Optiv has published a report based on a recent survey of cybersecurity leaders that highlights the critical importance of implementing zero trust as an effective way to reduce …

Soaring losses accelerate investments in anti-fraud tech
The pandemic has opened a Pandora’s box of global fraud. Faced with a seemingly endless onslaught of schemes and scams, anti-fraud pros have doubled down on analytics, …

What is fueling digital anxiety when working remotely?
Working from home has spiked since the onset of the Covid-19 pandemic in March of 2020. This effort to reduce health risks may have limited the spread of the virus, but …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)